Resiliency of open-source firewalls against remote discovery of last-matching rules

Khaled Salah*, Karim Sattar, Zubair Baig, Mohammed Sqalli, Prasad Calyam

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In today's networks, firewalls act as the first line of defense against unwanted and malicious traffics. Firewalls themselves can become targets of DoS attacks, thus jeopardizing their primary operation to filter traffic. Typically, packets are checked against a firewall policy consisting (in many cases) of thousands of rules. Last-matching rules are located at the bottom of the ruleset and consume the most CPU processing power of firewalls. If these rules get discovered by an attacker, the attacker can effectively launch a low-rate DoS attack that can bring the firewall to its knees. In prior work [1], we proposed and evaluated a technique to remotely discover the last matching rules of the Linux Netfilter firewall. In this paper, we examine the effectiveness of such technique on the discovery of last-matching rules in two other popular open-source network firewalls, namely Linux IPSets and FreeBSD ipfw.

Original languageEnglish
Title of host publicationSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks
Pages186-192
Number of pages7
DOIs
StatePublished - 2009

Publication series

NameSIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks

Keywords

  • DoS attacks
  • Firewalls
  • Nework security

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Resiliency of open-source firewalls against remote discovery of last-matching rules'. Together they form a unique fingerprint.

Cite this